Nmap Development mailing list archives

RE: UMIT screenshots


From: Víctor Chapela <victorc () emlink com mx>
Date: Sun, 7 Aug 2005 21:05:39 -0700

Hi,

Looks like a good start to me. 

One thing I would suggest in the interfase is to be able to see and change the nmap command line you are about to 
execute. That would help a lot to use some advanced features or customize it on the fly without having to save them all 
previously as a profile. 

Will you have a GUI based configuration page for the profiles or will we have to add the parameters to a command line 
based profile or configuration file?

Another suggestion, be sure to test the interface with several hundred hosts at least. I have sometimes had to scan 
over ten thousand hosts. It would be nice if you could think about how to group them further (on a subnet basis or even 
with custom masks). This would be very useful. 

I don't want to overextend your scope but another very useful feature would be to have a quick search that could narrow 
down the number of hosts you display by their IP, their Open Ports or their OS.

Cheers and good luck,
-Victor


-----Original Message-----
From: nmap-dev-bounces () insecure org [mailto:nmap-dev-bounces () insecure org] On Behalf Of Adriano Monteiro
Sent: August 7, 2005 10:44 PM
To: nmap-dev () insecure org
Subject: UMIT screenshots

Hi folks,

UMIT is the next nmap frontend, it's ben developed in Python+GTK and is portable.

I wish to get some comments of the community about what the users wait from UMIT. Here are some screenshots:
http://umit.sourceforge.net/screenshots/umit_pics/

This week, I'll try to release an alpha version of UMIT to be tested.

Cheers,

-- 

Adriano Monteiro Marques
http://www.gopython.com.br
http://umit.sourceforge.net
py.adriano () gmail com

"Free software is a matter of liberty not price."
(PYTHON powered)


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


Current thread: